background image

XEROX WorkCentre 

3550 

Information Assurance Disclosure Paper 

 

18 

Ver. 1.3, March 2011 

        

Page 

 18 of 32 

2.8.2.5.

 

Port 88, Kerberos 

This port is only open when the device is communicating with the Kerberos server to authenticate a user, and is only 
used only to authenticate users in conjunction with the Network Scanning feature.  To disable this port, 
authentication must be disabled, and this is accomplished via the Local User Interface. 

This version of software has Kerberos 5.1.1 with DES (Data Encryption Standard) and 64-bit encryption. The Kerberos 
code is limited to user authentication, and is used to authenticate a user with a given Kerberos server as a valid user 
on the network.  Please note that the Kerberos server (a 3rd party device) needs to be set up for each user.  Once the 
user is authenticated, the Kerberos software has completed its task. This code will not and cannot be used to encrypt 
or decrypt documents or other information. 

This feature is based on the Kerberos program from the Massachusetts Institute of Technology (MIT).  The Kerberos 
network authentication protocol is publicly available on the Internet as freeware at 
http://web.mit.edu/kerberos/www/.  Xerox has determined that there are no export restrictions on this version of the 
software.  However, there are a few deviations our version of Kerberos takes from the standard Kerberos 
implementation from MIT.  These deviations are: 

1)

 

The device does not keep a user’s initial authentication and key after the user has been authenticated.  In a 

standard Kerberos implementation, once a user is authenticated, the device holds onto the authentication for a 
programmed timeout (the usual default is 12 hours) or until the user removes it (prior to the timeout period).  In 
the Xerox implementation, all traces of authentication of the user are removed once they have been 
authenticated to the device.  The user can send any number of jobs until the user logs off the system, either 
manually or through system timeout. 

2)

 

The device ignores clock skew errors.  In a standard implementation of Kerberos, authentication tests will fail if a 

device clock is 5 minutes (or more) different from the Kerberos server.  The reason for this is that given enough 
time, someone could reverse engineer the authentication and gain access to the network.  With the 5-minute 
timeout, the person has just 5 minutes to reverse engineer the authentication and the key before it becomes 
invalid.  It was determined during the implementation of Kerberos for our device that it would be too difficult for 
the user/SA to keep the device clock in sync with the Kerberos server, so the Xerox instantiation of Kerberos has 
the clock skew check removed.  The disadvantage is that this gives malicious users unlimited time to reverse 
engineer the user’s key.  However, since this key is only valid to access the Network Scanning features on a 
device, possession of this key is of little use for nefarious purposes. 

3)

 

The device ignores much of the information provided by Kerberos for authenticating.  For the most part, the 

device only pays attention to information that indicates whether authentication has passed.  Other information 
that the server may return (e.g. what services the user is authenticated for) is ignored or disabled in the Xerox 
implementation.  This is not an issue since the only service a user is being authenticated for is access to an e-
mail directory.  No other network services are accessible from the Local UI. 

Xerox has received an opinion from its legal counsel that the device software, including the implementation of a 
Kerberos encryption protocol in its network authentication feature, is not subject to encryption restrictions based on 
Export Administration Regulations of the United States Bureau of Export Administration (BXA).  This means that it 
can be exported from the United States to most destinations and purchasers without the need for previous approval 
from or notification to BXA.  At the time of the opinion, restricted destinations and entities included terrorist-
supporting states (Cuba, Iran, Libya, North Korea, Sudan and Syria), their nationals, and other sanctioned entities 
such as persons listed on the Denied Parties List.  Xerox provides this information for the convenience of its customers 
and not as legal advice.  Customers are encouraged to consult with legal counsel to assure their own compliance with 
applicable export laws. 

2.8.2.6.

 

Ports 137, 138, 139, NETBIOS 

For print jobs, these ports support the submission of files for printing as well as support Network Authentication 
through SMB.  Port 137 is the standard NetBIOS Name Service port, which is used primarily for WINS.  Port 138 
supports the CIFS browsing protocol.  Port 139 is the standard NetBIOS Session port, which is used for printing.  Ports 
137, 138 and 139 may be configured in the Properties tab of the device’s web page. 

For Network Scanning features, ports 138 and 139 are used for both outbound (i.e. exporting scanned images and 
associated data) and inbound functionality (i.e. retrieving Scan Templates). In both instances, these ports are only 
open when the files are being stored to the server or templates are being retrieved from the Template Pool. For these 
features, SMB protocol is used. 

Summary of Contents for WorkCentre 3550

Page 1: ...Xerox WorkCentre 3550 Information Assurance Disclosure Paper Version 1 2 Prepared by Mark Bixler Xerox Corporation 800 Phillips Road Webster New York 14580...

Page 2: ...March 2011 Page 2 of 32 2011 Xerox Corporation All rights reserved Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and or other counties Other com...

Page 3: ...2 2 4 USB Ports 10 2 3 Fax Module 11 2 3 1 Purpose 11 2 3 2 Hardware 11 2 4 Scanner 11 2 4 1 Purpose 11 2 4 2 Hardware 11 2 5 Local User Interface LUI 12 2 5 1 Purpose 12 2 5 2 Hardware 12 2 6 Markin...

Page 4: ...ultifunction models only 24 3 3 2 Network Scanning Multifunction models only 24 3 4 Diagnostics 24 4 SECURITY ASPECTS OF SELECTED FEATURES 25 4 1 SMart eSolutions 25 4 2 1 Meter Assistant 25 4 2 2 Sup...

Page 5: ...n functions and features of the WorkCentre products relative to Information Assurance IA This document does NOT provide tutorial level information about security connectivity PDLs or WorkCentre produc...

Page 6: ...input document handler and scanner marking engine including paper path controller and user interface Figure 2 1 WorkCentre Multifunction System Document Feeder Scanner IIT Marking Engine IOT Paper Tra...

Page 7: ...Disclosure Paper 7 Ver 1 3 March 2011 Page 7 of 32 2 1 Security relevant Subsystems 2 1 1 Physical Partitioning The security relevant subsystems of the product are partitioned as shown in Figure 2 2...

Page 8: ...ce Network Authentication Controller Graphical User Interface Cryptographic Operations Controller User Data Protection SSL Controller User Data Protection IP Filtering Controller User Data Protection...

Page 9: ...ead from DRAM and sent to the Image Output Terminal IOT for marking on hardcopy output For long documents the production of hardcopy may begin before the entire original is scanned achieving a level o...

Page 10: ...are limited to controller parameters that are needed for normal operation Both ports can be disabled by an Admin via the WebUI USB USB port and location Purpose USB 2 0 Host port Printing from USB sc...

Page 11: ...rk Volatile Memory Description Type SRAM DRAM etc Size User Modifiable Y N Function or Use Process to Clear None n a n a n a n a Additional Information Non Volatile Memory Description Type Flash EEPRO...

Page 12: ...n Type Flash EEPROM etc Size User Modifiable Y N Function or Use Process to Clear PROM 64KB N No user image data stored None Additional Information All memory listed above contains code for execution...

Page 13: ...bupnp UUID library wpa_supplicant ldns Info zip TWAIN sample Data Source and Application WTL v8 0 CUPS library libjpeg v6b libxml2 Expat XML Parser Unicode Kerberos 5 sorttable Little CMS v1 15 libstd...

Page 14: ...Disclosure Paper 14 Ver 1 3 March 2011 Page 14 of 32 2 7 3 Network Protocols Figure 2 is an interface diagram depicting the protocol stacks supported by the device annotated according to the DARPA mo...

Page 15: ...and the device A shared secret is used to encrypt the traffic flowing through this tunnel SSL must be enabled in order to set up the shared secret When an IPSec tunnel is established between a client...

Page 16: ...TCP UDP SLP 443 TCP SSL 515 TCP LPR 546 UDP DHCPv6 631 TCP IPP 636 TCP sLDAP 1124 TCP UDP Network Scan Utility 1900 UDP SSDP 3003 TCP HTTP SNMP reply 5200 TCP UPnP 5353 UDP Multicast DNS 6000 UDP Set...

Page 17: ...view the properties of the device but not change them without logging into the machine with administrator privileges The HTTP server can only host the web pages resident on the device It does not and...

Page 18: ...ld be too difficult for the user SA to keep the device clock in sync with the Kerberos server so the Xerox instantiation of Kerberos has the clock skew check removed The disadvantage is that this give...

Page 19: ...SSL must also be enabled in order to use any of the Web Services Automatic Meter Reads or Network Scanning Validation Service SSL should be enabled so that the device can be securely administered fro...

Page 20: ...port and this port is active when the http server is active i e if the http server is disabled this port will be closed If someone attempted to send an SNMP reply to this port via the network the repl...

Page 21: ...nged from its default value immediately upon product installation The PIN should be set to a minimum of 8 characters in length and changed at least once per month Longer PINs can be changed less frequ...

Page 22: ...t Authentication Steps 1 The device broadcasts an authentication request that is answered by the Domain Controller 2 The Domain Controller responds back to the device whether or not the user was succe...

Page 23: ...est directly to the Domain Controller through the router using the IP address of the Domain Controller 4 The Domain Controller responds back to the device through the router whether or not the user wa...

Page 24: ...Scan to E mail The device logs into an SMTP Server as set up by the SA via CWIS It will only log into the Server when a user attempts to use the scan to email feature At the time the LDAP server must...

Page 25: ...ation Server has been established the Meter Assistant service will poll the Xerox Communication server daily over the network The server will check whether it is time in the billing cycle to update th...

Page 26: ...Ver 1 3 March 2011 Page 26 of 32 5 Responses to Known Vulnerabilities 5 1 Security Xerox www xerox com security Xerox maintains an evergreen public web page that contains the latest security informati...

Page 27: ...kard HTTP Hypertext transfer protocol IBM International Business Machines ICMP Internet Control Message Protocol IETF Internet Engineering Task Force IFAX Internet Fax IIT Image Input Terminal the sca...

Page 28: ...e Location Protocol SNMP Simple Network Management Protocol SRAM Static Random Access Memory SSDP Simple Service Discovery Protocol SSL Secure Sockets Layer TCP Transmission Control Protocol TIFF Tagg...

Page 29: ...re supported as long as the basic MIB structures have been implemented SNMP version Network Transport support WorkCentre SNMPv1 RFC 1157 supported SNMPv2P RFCs 140x supported SNMPv2C RFCs 190x support...

Page 30: ...hange GET SET TRAP PDU community names supported Printer MIB traps supported printerV1Alert printerV2Alert SNMP Generic Traps supported coldStart warmStart authenticationFailure Vendor specific Traps...

Page 31: ...trap Protocol BOOTP 1542 X 500 Distinguished Name RFC references 1779 2253 2297 2293 SLP 2608 Dynamic Host Configuration Protocol DHCP 2131 DHCP Options and BOOTP Vendor Extensions 2132 X 509 Certific...

Page 32: ...re Paper 32 Ver 1 3 March 2011 Page 32 of 32 Portable Document Format Reference Manual Version 1 3 6 4 Appendix E References Kerberos FAQ http www nrl navy mil CCS people kenh kerberos faq html IP por...

Reviews: